{"title":"加密RDF-Graph的可能性","authors":"Sabrina Gerbracht","doi":"10.1109/ICTTA.2008.4530288","DOIUrl":null,"url":null,"abstract":"In this paper different approaches on achieving privacy protection in RDF graphs are discussed. Mainly this means encryption of elements and subgraphs of an RDF graph. Existing solutions have the disadvantage, that along 'with the encryption many new statements have to be generated, 'what results in a rapidly growing graph. By combining different approaches, these disadvantages can be eliminated. The result 'will be an elegant possibility to encrypt parts of an RDF graph, 'without increasing the 'whole RDF graph unnecessarily.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"101 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"Possibilities to Encrypt an RDF-Graph\",\"authors\":\"Sabrina Gerbracht\",\"doi\":\"10.1109/ICTTA.2008.4530288\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper different approaches on achieving privacy protection in RDF graphs are discussed. Mainly this means encryption of elements and subgraphs of an RDF graph. Existing solutions have the disadvantage, that along 'with the encryption many new statements have to be generated, 'what results in a rapidly growing graph. By combining different approaches, these disadvantages can be eliminated. The result 'will be an elegant possibility to encrypt parts of an RDF graph, 'without increasing the 'whole RDF graph unnecessarily.\",\"PeriodicalId\":330215,\"journal\":{\"name\":\"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications\",\"volume\":\"101 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-04-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICTTA.2008.4530288\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTTA.2008.4530288","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this paper different approaches on achieving privacy protection in RDF graphs are discussed. Mainly this means encryption of elements and subgraphs of an RDF graph. Existing solutions have the disadvantage, that along 'with the encryption many new statements have to be generated, 'what results in a rapidly growing graph. By combining different approaches, these disadvantages can be eliminated. The result 'will be an elegant possibility to encrypt parts of an RDF graph, 'without increasing the 'whole RDF graph unnecessarily.